Resources

Analyst Reports:

2018 GARTNER SIEM MAGIC QUADRANT

2018 GARTNER SIEM MAGIC QUADRANT

Read the Gartner Magic Quadrant report to learn what real SIEM customers say about ArcSight and the strengths that put us in the leaders' quadrant.

Read More

10 Ways To Build a Better Big Data Security Strategy

10 Ways To Build a Better Big Data Security Strategy

Enterprises of all sizes are awash in data ranging from mundane databases to unstructured data such as social media streams, streaming media, and clickstreams.

Read Paper
How to Better Guard Against a Security Breach

How to Better Guard Against a Security Breach

While making progress in setting strategies and policies to anticipate security breaches, many organizations are unable to fully utilize security and event data.

Read Paper
Security Research: Cyber Risk Report 2015

Security Research: Cyber Risk Report 2015

In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.

Read Paper
Ponemon Institute 2015 Cost of Cyber Crime Study

Ponemon Institute 2015 Cost of Cyber Crime Study

We are pleased to present the 2015 Cost of Cyber Crime Study: Global, sponsored by Hewlett Packard Enterprise. This year’s study is based upon a representative sample of 252 organizations in seven countries.

Read Paper
SANS Analytics and Intelligence Survey 2014

SANS Analytics and Intelligence Survey 2014

Despite perceived gains in security analytics and intelligence capabilities, many organizations are still using the term analytics to describe what is fundamentally event management and monitoring, according to the SANS 2014 Analytics and Intelligence Survey recently taken by 350 IT professionals.

Read Paper

Data Sheets:

ARCSIGHT Connectors

ARCSIGHT Connectors

Once collected, log data needs to be analyzed in real time and historically to address diverse use cases, such as security monitoring and regulatory compliance. Typically, all processing is left to centralized log management and SIEM components.

Read Paper
ARCSIGHT ESM

ARCSIGHT ESM

ArcSight ESM is the brain of the ArcSight SIEM platform. It analyzes and correlates every event that occurs across the organization —every login, logo, file access, database query—to deliver accurate prioritization of security risks and compliance violations.

Read Paper
ARCSIGHT Express

ARCSIGHT Express

The all-in-one SIEM appliance combines the best of log management and security event management. This SIEM appliance gives you the insight and tools to identify and prioritize threats so that you can enhance your incident response.

Read Paper
ARCSIGHT Logger

ARCSIGHT Logger

ArcSight Logger delivers a cost-effective universal log management solution that unifies searching, reporting, alerting, and analysis across any type of enterprise machine data. This uni ed machine data can be used for compliance, regulations, security, IT operations, and log analytics.

Read Paper

Industry Case Studies:


Education

Investigations into suspicious activities dropped from weeks to hours, freeing up skilled resources to work on IT service delivery.

Read Paper

Finance

Centralize security event administration for corporate datacenter and branch o ices in order to gain comprehensive event analysis and accelerate the time to resolve security issues.

Read Paper

Health Care

Implement an effective security information and event management (SIEM) system in order to reduce multiple dashboards to a single version of the truth across the enterprise.

Read Paper

Public Sector

Establish a centralized Department-wide cybersecurity program to enhance the security of HHS systems across all operating divisions.

Read Paper

Technology

Implement a monitoring tool to gather and aggregate data on system status and events, and user activity, on an enterprise basis; to perform analysis on that data; and present Global SOC analysts with actionable information.

Read Paper

Telecom

Improve the overall security and defense capability of the business support network, reducing asset security risks, and improving management.

Read Paper

Utilities

Centralize appliance log collection and analysis from over 250 VIVA sources to meet stringent compliance requirements and monitor access to sensitive assets by privileged accounts.

Read Paper

White Papers:

Growing the Security Analyst

Growing the Security Analyst

In this paper, we will explore the aspects of recruiting, training, and retaining security analysts. A blueprint will be provided for how to find and assess candidates, how to nurture analysts during employment, and what sorts of opportunities should be granted to security analysts to help with job satisfaction and ultimately effectiveness and retention.

Read Paper
5 Critical Ways To Take A More Collaborative Approach To IT Security

5 Critical Ways To Take A More Collaborative Approach To IT Security

Companies still rely heavily on fairly traditional methods of data security, such as password management and acceptable use policies, to protect their information from unauthorized access.

Read Paper
Protecting Your Mid-Size Business from Today's Security Threats

Protecting Your Mid-Size Business from Today's Security Threats

If you were one of millions of customers who used a credit or debit card at Target between Thanksgiving and Dec. 19, 2013, you’re well aware that your card number and even your PIN are likely for sale on some dark corner of the Internet.

Read Paper
Protecting Your Business With A More Mature IT Security Strategy

Protecting Your Business With A More Mature IT Security Strategy

The chances are good that, within the previous week, the successful hack of a major brand was in the news—and that’s going to be true no matter when you happen to be reading this. In fact, these exploits are so common that they hardly qualify as news anymore.

Read Paper
Security For A Faster World

Security For A Faster World

Cyber crime. The very word sets many CIOs’ hearts racing. Although far from a new threat, cyber crime is getting increasingly sophisticated, often nipping at the heels or surpassing the security of enterprises.

Read Paper
State Of Security Operations

State Of Security Operations

Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets.

Read Paper

    Trusted By the Best: